Matthew J. B. Robshaw
Matthew Robshaw
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2016
- [c42]Simon R. Blackburn, Matthew J. B. Robshaw:
On the Security of the Algebraic Eraser Tag Authentication Protocol. ACNS 2016: 3-17 - [e8]Matthew Robshaw, Jonathan Katz:
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9814, Springer 2016, ISBN 978-3-662-53017-7 [contents] - [e7]Matthew Robshaw, Jonathan Katz:
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9815, Springer 2016, ISBN 978-3-662-53007-8 [contents] - [e6]Matthew Robshaw, Jonathan Katz:
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Lecture Notes in Computer Science 9816, Springer 2016, ISBN 978-3-662-53014-6 [contents] - [i5]Simon R. Blackburn, Matthew J. B. Robshaw:
On the security of the Algebraic Eraser tag authentication protocol. CoRR abs/1602.00860 (2016) - [i4]Simon R. Blackburn, Matthew J. B. Robshaw:
On the Security of the Algebraic Eraser Tag Authentication Protocol. IACR Cryptology ePrint Archive 2016: 91 (2016) - 2015
- [j7]Lejla Batina, Matthew J. B. Robshaw:
Introduction to the CHES 2014 special issue. J. Cryptographic Engineering 5(2): 71-72 (2015) - [c41]Carlos Cid, Loïc Ferreira, Gordon Procter, Matthew J. B. Robshaw:
Algebraic Cryptanalysis and RFID Authentication. RFIDSec 2015: 104-121 - [e5]Rosario Gennaro, Matthew Robshaw:
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9215, Springer 2015, ISBN 978-3-662-47988-9 [contents] - [e4]Rosario Gennaro, Matthew Robshaw:
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9216, Springer 2015, ISBN 978-3-662-47999-5 [contents] - 2014
- [e3]Lejla Batina, Matthew Robshaw:
Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings. Lecture Notes in Computer Science 8731, Springer 2014, ISBN 978-3-662-44708-6 [contents] - 2012
- [c40]
- [c39]Sébastien Canard, Loïc Ferreira, Matthew Robshaw:
Improved (and Practical) Public-Key Authentication for UHF RFID Tags. CARDIS 2012: 46-61 - [i3]Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw:
The LED Block Cipher. IACR Cryptology ePrint Archive 2012: 600 (2012) - 2011
- [b2]Lars R. Knudsen, Matthew Robshaw:
The Block Cipher Companion. Information Security and Cryptography, Springer 2011, ISBN 978-3-642-17341-7, pp. I-XIV, 1-267 - [c38]Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw:
The LED Block Cipher. CHES 2011: 326-341 - [c37]Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang:
On Related-Key Attacks and KASUMI: The Case of A5/3. INDOCRYPT 2011: 146-159 - [r4]Matthew J. B. Robshaw:
One-Way Function. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 887-888 - [r3]Matthew J. B. Robshaw:
Trapdoor One-Way Function. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1317-1318 - 2010
- [j6]Máire O'Neill, Matthew J. B. Robshaw:
Low-cost digital signature architecture suitable for radio frequency identification tags. IET Computers & Digital Techniques 4(1): 14-26 (2010) - [j5]Axel Poschmann, Matthew J. B. Robshaw, Frank Vater, Christof Paar:
Lightweight Cryptography and RFID: Tackling the Hidden Overhead. TIIS 4(2): 98-116 (2010) - [c36]
- [c35]Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw:
PRINTcipher: A Block Cipher for IC-Printing. CHES 2010: 16-32
2000 – 2009
- 2009
- [c34]Ryad Benadjila, Olivier Billet, Shay Gueron, Matthew J. B. Robshaw:
The Intel AES Instructions Set and the SHA-3 Candidates. ASIACRYPT 2009: 162-178 - [c33]Axel Poschmann, Matthew J. B. Robshaw, Frank Vater, Christof Paar:
Lightweight Cryptography and RFID: Tackling the Hidden Overheads. ICISC 2009: 129-145 - 2008
- [c32]Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin:
Looking Back at a New Hash Function. ACISP 2008: 239-253 - [c31]Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar:
Correlated Keystreams in Moustique. AFRICACRYPT 2008: 246-257 - [c30]Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin:
Hash Functions and RFID Tags: Mind the Gap. CHES 2008: 283-299 - [c29]Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
HB#: Increasing the Security and Efficiency of HB+. EUROCRYPT 2008: 361-378 - [c28]Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
Good Variants of HB+ Are Hard to Find. Financial Cryptography 2008: 156-170 - [c27]Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
How to Encrypt with the LPN Problem. ICALP (2) 2008: 679-690 - [c26]Jonathan Etrog, Matthew J. B. Robshaw:
The Cryptanalysis of Reduced-Round SMS4. Selected Areas in Cryptography 2008: 51-65 - [p1]
- [e2]Matthew J. B. Robshaw, Olivier Billet:
New Stream Cipher Designs - The eSTREAM Finalists. Lecture Notes in Computer Science 4986, Springer 2008, ISBN 978-3-540-68350-6 [contents] - [i2]Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
HB#: Increasing the Security and Efficiency of HB+. IACR Cryptology ePrint Archive 2008: 28 (2008) - 2007
- [c25]Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin:
On Building Hash Functions from Multivariate Quadratic Equations. ACISP 2007: 82-95 - [c24]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe:
PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007: 450-466 - [c23]
- [c22]Máire McLoone, Matthew J. B. Robshaw:
New Architectures for Low-Cost Public Key Cryptography on RFID Tags. ISCAS 2007: 1827-1830 - 2006
- [b1]Carlos Cid, Sean Murphy, Matthew J. B. Robshaw:
Algebraic aspects of the advanced encryption standard. Springer 2006, ISBN 978-0-387-24363-4, pp. I-VI, 1-145 - [j4]Matthew J. B. Robshaw:
An overview of RFID tags and new cryptographic developments. Inf. Sec. Techn. Report 11(2): 82-88 (2006) - [c21]Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw:
Combining Compression Functions and Block Cipher-Based Hash Functions. ASIACRYPT 2006: 315-331 - [c20]Simon Fischer, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw:
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. INDOCRYPT 2006: 2-16 - [c19]
- [e1]Matthew J. B. Robshaw:
Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4047, Springer 2006, ISBN 3-540-36597-4 [contents] - 2005
- [c18]
- [c17]
- [c16]Carlos Cid, Sean Murphy, Matthew J. B. Robshaw:
An Algebraic Framework for Cipher Embeddings. IMA Int. Conf. 2005: 278-289 - [c15]Jakob Jonsson, Matthew J. B. Robshaw:
Securing RSA-KEM via the AES. Public Key Cryptography 2005: 29-46 - [r2]
- [r1]
- [i1]Henri Gilbert, Matthew J. B. Robshaw, Hervé Sibert:
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol. IACR Cryptology ePrint Archive 2005: 237 (2005) - 2004
- [c14]Hans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw:
The Cryptanalysis of the AES - A Brief Survey. AES Conference 2004: 1-10 - [c13]Hoon Wei Lim, Matthew J. B. Robshaw:
On Identity-Based Cryptography and Grid Computing. International Conference on Computational Science 2004: 474-477 - [c12]Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw:
On Permutation Operations in Cipher Design. ITCC (2) 2004: 569-577 - 2003
- [c11]Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw:
Ten Years of Information Security Masters Programmes. World Conference on Information Security Education 2003: 215-230 - 2002
- [j3]Sean Murphy, Matthew J. B. Robshaw:
Key-Dependent S-Boxes and Differential Cryptanalysis. Des. Codes Cryptography 27(3): 229-255 (2002) - [c10]
- 2001
- [c9]Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw:
Analysis of SHA-1 in Encryption Mode. CT-RSA 2001: 70-83 - 2000
- [c8]Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin:
RC6 as the AES. AES Candidate Conference 2000: 337-342
1990 – 1999
- 1999
- [c7]Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner:
Truncated Differentials and Skipjack. CRYPTO 1999: 165-180 - [c6]Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin:
Improved Analysis of Some Simplified Variants of RC6. FSE 1999: 1-15 - 1998
- [c5]Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw:
On the Design and Security of RC2. FSE 1998: 206-221 - 1996
- [c4]Lars R. Knudsen, Matthew J. B. Robshaw:
Non-Linear Approximations in Linear Cryptanalysis. EUROCRYPT 1996: 224-236 - 1995
- [j2]Kenneth G. Paterson, Matthew J. B. Robshaw:
Storage efficient decoding for a class of binary be Bruijn sequences. Discrete Mathematics 138(1-3): 327-341 (1995) - 1994
- [j1]Matthew J. B. Robshaw:
On Evaluating the Linear Complexity of a Sequence of Least Period 2n. Des. Codes Cryptography 4(3): 263-269 (1994) - [c3]Burton S. Kaliski Jr., Matthew J. B. Robshaw:
Linear Cryptanalysis Using Multiple Approximations. CRYPTO 1994: 26-39 - [c2]Burton S. Kaliski Jr., Matthew J. B. Robshaw:
Linear Cryptanalysis Using Multiple Approximations and FEAL. FSE 1994: 249-264 - 1993
- [c1]
Coauthor Index
last updated on 2019-01-11 22:26 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint